Skip to content

VSCode SFTP File Exposure

ID: vscode-sftp

Severity: high

Author: geeknik

Tags: exposure,vscode,sftp,ssh,files

It discloses sensitive files created by vscode-sftp for VSCode, contains SFTP/SSH server details and credentials.

id: vscode-sftp
info:
name: VSCode SFTP File Exposure
author: geeknik
severity: high
description: |
It discloses sensitive files created by vscode-sftp for VSCode, contains SFTP/SSH server details and credentials.
classification:
cpe: cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
vendor: microsoft
product: visual_studio_code
shodan-query: html:"sftp.json"
tags: exposure,vscode,sftp,ssh,files
http:
- method: GET
path:
- "{{BaseURL}}/sftp.json"
- "{{BaseURL}}/.config/sftp.json"
- "{{BaseURL}}/.vscode/sftp.json"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"name":'
- '"host":'
- '"protocol":'
condition: and
- type: word
part: header
words:
- "application/json"
- type: status
status:
- 200
# digest: 4a0a0047304502203d5e45f9602d97a95b37348afa381f4c2ffc1562dfade1c29d7e46b8ff0b424f022100fff19d80f8963f457cf3a248c1e9a760c1bc9bd74d3da5d39ae011845c8fc130:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/files/vscode-sftp.yaml"

View on Github